{"id":1189,"date":"2018-09-10T11:56:35","date_gmt":"2018-09-10T11:56:35","guid":{"rendered":"https:\/\/anlix.io\/?p=99"},"modified":"2022-06-28T20:12:01","modified_gmt":"2022-06-28T20:12:01","slug":"roteador-seguro","status":"publish","type":"post","link":"https:\/\/anlix.io\/en\/roteador-seguro\/","title":{"rendered":"Is your router secure? Technical analysis of security on popular routers"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: #ffffff;background-position: center center;background-repeat: no-repeat;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-bottom: 0px;margin-top: 0px;border-width: 0px 0px 0px 0px;border-color:#eae9e9;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_6 1_6 fusion-one-sixth fusion-column-first fusion-no-small-visibility fusion-no-medium-visibility\" style=\"width:16.666666666667%;width:calc(16.666666666667% - ( ( 4% + 4% ) * 0.16666666666667 ) );margin-right: 4%;margin-top:25px;margin-bottom:25px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-two-third\" style=\"width:66.666666666667%;width:calc(66.666666666667% - ( ( 4% + 4% ) * 0.66666666666667 ) );margin-right: 4%;margin-top:25px;margin-bottom:40px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-text fusion-text-1\"><p>Wi-Fi (wireless) routers are the gateway to and from computers and smart devices to the Internet. As in homes, it is very important to ensure that the entrance and exit doors are always properly locked, preventing the action of intruders. The same care should be taken with our Wi-Fi routers.<\/p>\n<\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-bottom:20px;width:100%;\"><div class=\"fusion-separator-border sep-double\" style=\"border-color:#e0dede;border-top-width:1px;border-bottom-width:1px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-2\"><span class=\"fusion-dropcap dropcap\">\u00c7<\/span>\n<p>With the objective of identifying possible vulnerabilities, researchers analyzed the routers of the TP-LINK models: TL-WR849N v6, TL-WR940N v5, D-LINK DIR-819 A3, Intelbras NCLOUD and Tenda F3. The equipment was connected to a DHCP server through the WAN port (external access), using the Nmap tool to perform scans on each of the 65535 possible ports to detect possible exposed services.<\/p>\n<p>The same tests were carried out on the LAN port of each device to detect possible vulnerabilities in the local network. LAN (internal access) network analysis is important when malicious software manages to penetrate your local network through malicious emails, malicious web pages and software downloaded from unreliable sources.<\/p>\n<p>To avoid false alarms, all tested models had their firmware versions updated to the latest version made available by the manufacturer.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_6 1_6 fusion-one-sixth fusion-column-last fusion-no-small-visibility fusion-no-medium-visibility\" style=\"width:16.666666666667%;width:calc(16.666666666667% - ( ( 4% + 4% ) * 0.16666666666667 ) );margin-top:25px;margin-bottom:25px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"margin-top:25px;margin-bottom:25px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"imageframe-align-center\"><span class=\"fusion-imageframe imageframe-none imageframe-1 hover-type-zoomin\"><img decoding=\"async\" width=\"600\" height=\"450\" title=\"router\" src=\"https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/roteador-1.jpg\" data-orig-src=\"https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/roteador-1-600x450.jpg\" class=\"lazyload img-responsive wp-image-1419\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271920%27%20height%3D%271440%27%20viewBox%3D%270%200%201920%201440%27%3E%3Crect%20width%3D%271920%27%20height%3D%271440%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/roteador-1-200x150.jpg 200w, https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/roteador-1-400x300.jpg 400w, https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/roteador-1-600x450.jpg 600w, https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/roteador-1-800x600.jpg 800w, https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/roteador-1-1200x900.jpg 1200w, https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/roteador-1.jpg 1920w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1000px) 100vw, 1200px\" \/><\/span><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_6 1_6 fusion-one-sixth fusion-column-first fusion-no-small-visibility fusion-no-medium-visibility\" style=\"width:16.666666666667%;width:calc(16.666666666667% - ( ( 4% + 4% ) * 0.16666666666667 ) );margin-right: 4%;margin-top:25px;margin-bottom:25px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_2_3 2_3 fusion-two-third\" style=\"width:66.666666666667%;width:calc(66.666666666667% - ( ( 4% + 4% ) * 0.66666666666667 ) );margin-right: 4%;margin-top:25px;margin-bottom:25px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><style type=\"text\/css\"><\/style><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"margin-top:20px;margin-right:0px;margin-bottom:20px;margin-left:0px;\"><h2 class=\"title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:35;line-height:1.25;\">Security analysis against external attacks, by the WAN port<\/h2><\/div><div class=\"fusion-text fusion-text-3\"><p><span style=\"background-color: rgba(255, 255, 255, 0); color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); letter-spacing: var(--body_typography-letter-spacing);\">The first analysis carried out was in relation to external attacks against the router, that is, attacks that any hacker on the Internet could carry out without having to enter the local network first. Using the Nmap tool and consulting databases of security vulnerabilities such as VulDB and ExploitDB, the following results were obtained by analyzing the equipment&#039;s WAN port:<\/span><\/p>\n<p>Result Model<\/p>\n<p><b>TP-LINK TL-WR849N v6<\/b> \u2013 No vulnerability detected<\/p>\n<p><b>TP-LINK TL-WR940N v5<\/b> \u2013 No vulnerability detected<\/p>\n<p><b>D-LINK DIR-819 A3<\/b> \u2013 No vulnerability detected<\/p>\n<p><b>Intelbras NCLOUD NCLOUD<\/b> \u2013 Ports 53, 6352 and 7777 open. 2 vulnerabilities detected.<\/p>\n<p><b>tent F3<\/b> \u2013 No vulnerability detected<\/p>\n<\/div><div class=\"fusion-text fusion-text-4\"><p>Vulnerabilities were identified in the Intelbras NCLOUD router that presents DNS and uPnP services open to the Internet. After checking the Intelbras support web page, looking for a more updated version of the firmware for this equipment, no correction was found. The safe alternative for users of this model is to insert Firewall rules for each of these ports, blocking external access.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_6 1_6 fusion-one-sixth fusion-column-last fusion-no-small-visibility fusion-no-medium-visibility\" style=\"width:16.666666666667%;width:calc(16.666666666667% - ( ( 4% + 4% ) * 0.16666666666667 ) );margin-top:25px;margin-bottom:25px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_6 1_6 fusion-one-sixth fusion-column-first fusion-no-small-visibility fusion-no-medium-visibility\" style=\"width:16.666666666667%;width:calc(16.666666666667% - ( ( 4% + 4% ) * 0.16666666666667 ) );margin-right: 4%;margin-top:25px;margin-bottom:25px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_2_3 2_3 fusion-two-third\" style=\"width:66.666666666667%;width:calc(66.666666666667% - ( ( 4% + 4% ) * 0.66666666666667 ) );margin-right: 4%;margin-top:25px;margin-bottom:25px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><style type=\"text\/css\"><\/style><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"margin-top:20px;margin-right:0px;margin-bottom:20px;margin-left:0px;\"><h2 class=\"title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:35;line-height:1.25;\">Security analysis against internal attacks, over LAN port or over Wi-Fi<\/h2><\/div><div class=\"fusion-text fusion-text-5\"><p><span style=\"background-color: rgba(255, 255, 255, 0); color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); letter-spacing: var(--body_typography-letter-spacing);\">This type of attack can happen through e-mails with suspicious content, web pages infected with malicious content and also through programs downloaded from unreliable sources (pirate programs, for example). Through a computer connected to the LAN port of each of these devices, the same scan was carried out using the Nmap tool, in addition to consulting databases of security vulnerabilities such as VulDB and ExploitDB. The following results were obtained:<\/span><\/p>\n<p>Result Model<\/p>\n<p><b>TP-LINK TL-WR849N v6<\/b> \u2013 No vulnerability detected<\/p>\n<p><b>TP-LINK TL-WR940N v5<\/b> \u2013 Port 22 (SSH): 5 vulnerabilities<\/p>\n<p><b>D-LINK DIR-819 A3<\/b> \u2013 Port 22 (SSH): 3 Vulnerabilities<\/p>\n<p>Port 34938 (uPnP): 6 Vulnerabilities<\/p>\n<p><b>Intelbras NCLOUD<\/b> \u2013 Port 53 (DNS): 10 Vulnerabilities<\/p>\n<p>Port 80 (HTTP): 4 Vulnerabilities<\/p>\n<p>Port 6352 (uPnP): 1 Vulnerability<\/p>\n<p>Port 7777 (uPnP): 1 Vulnerability<\/p>\n<p><b>tent F3<\/b> \u2013 Port 80 (HTTP): 5 Vulnerabilities<\/p>\n<p>In this analysis, it is important to note that the SSH service is something specific for specialized access and should not be available for common use on the local network. HTTP and uPnP services are, in the vast majority of routers, available for the local network. Attention must be paid, however, to the large number of vulnerabilities detected. The programs responsible for offering these services on the router are often extremely outdated, favoring the detection and exploitation of security vulnerabilities.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_6 1_6 fusion-one-sixth fusion-column-last fusion-no-small-visibility fusion-no-medium-visibility\" style=\"width:16.666666666667%;width:calc(16.666666666667% - ( ( 4% + 4% ) * 0.16666666666667 ) );margin-top:25px;margin-bottom:25px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_6 1_6 fusion-one-sixth fusion-column-first fusion-no-small-visibility fusion-no-medium-visibility\" style=\"width:16.666666666667%;width:calc(16.666666666667% - ( ( 4% + 4% ) * 0.16666666666667 ) );margin-right: 4%;margin-top:25px;margin-bottom:25px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_2_3 2_3 fusion-two-third\" style=\"width:66.666666666667%;width:calc(66.666666666667% - ( ( 4% + 4% ) * 0.66666666666667 ) );margin-right: 4%;margin-top:25px;margin-bottom:25px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><style type=\"text\/css\"><\/style><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"margin-top:20px;margin-right:0px;margin-bottom:20px;margin-left:0px;\"><h2 class=\"title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:35;line-height:1.25;\">Lag in the version of services installed on routers<\/h2><\/div><div class=\"fusion-text fusion-text-6\"><p><span style=\"background-color: rgba(255, 255, 255, 0); color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); letter-spacing: var(--body_typography-letter-spacing);\">Through the Nmap tool, we were also able to obtain the version of some services installed on the routers. These services are responsible for providing common router functionality, such as DNS and uPnP. Old and outdated versions are dangerous as they are heavily exploited by hackers and have a greater number of security vulnerabilities exposed on the Internet. See, for example, the version and publication date of the services of some of the routers we evaluated.<\/span><\/p>\n<p>Model \u2013 Service, version and release date<\/p>\n<p><b>TP-LINK TL-WR849N v6<\/b> \u2013 uPnP service: 1.6.19. Released on 5\/9\/2012<\/p>\n<p><b>TP-LINK TL-WR940N v5<\/b> \u2013 SSH service: 2012.55. Released on 02\/24\/2012<\/p>\n<p><b>D-LINK DIR-819 A3<\/b> \u2013 SSH service: 0.51. Released on 3\/27\/2008<\/p>\n<p>\u2013 HTTP Service: 1.19. Released on 12\/19\/2003<\/p>\n<p>\u2013 uPnP service: 1.0. Released on 01\/28\/2008<\/p>\n<p><b>Intelbras NCLOUD<\/b> \u2013 DNS Service: 2.40. Released on 8\/29\/2007<\/p>\n<p>\u2013 uPnP service: 1.6. Released on 8\/4\/2011<\/p>\n<p>It is worth remembering that all evaluated models began to be sold in Brazil after 2016. Therefore, some services have more than 10 years of lag in relation to the current version. Updated versions are always important as they have more security vulnerability fixes.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion_builder_column_1_6 1_6 fusion-one-sixth fusion-column-last fusion-no-small-visibility fusion-no-medium-visibility\" style=\"width:16.666666666667%;width:calc(16.666666666667% - ( ( 4% + 4% ) * 0.16666666666667 ) );margin-top:25px;margin-bottom:25px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-13 fusion_builder_column_1_6 1_6 fusion-one-sixth fusion-column-first fusion-no-small-visibility fusion-no-medium-visibility\" style=\"width:16.666666666667%;width:calc(16.666666666667% - ( ( 4% + 4% ) * 0.16666666666667 ) );margin-right: 4%;margin-top:25px;margin-bottom:25px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-14 fusion_builder_column_2_3 2_3 fusion-two-third\" style=\"width:66.666666666667%;width:calc(66.666666666667% - ( ( 4% + 4% ) * 0.66666666666667 ) );margin-right: 4%;margin-top:25px;margin-bottom:25px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><style type=\"text\/css\"><\/style><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"margin-top:20px;margin-right:0px;margin-bottom:20px;margin-left:0px;\"><h3 class=\"title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:26;line-height:1.3;\">Conclusion<\/h3><\/div><div class=\"fusion-text fusion-text-7\"><p>Keeping your router up to date is essential for preventing security vulnerabilities. However, many times the manufacturer itself does not update the firmware of its routers, leaving known vulnerabilities exposed in the open network (Internet) as well as in its local network.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-15 fusion_builder_column_1_6 1_6 fusion-one-sixth fusion-column-last fusion-no-small-visibility fusion-no-medium-visibility\" style=\"width:16.666666666667%;width:calc(16.666666666667% - ( ( 4% + 4% ) * 0.16666666666667 ) );margin-top:25px;margin-bottom:25px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-bg-parallax\" data-bg-align=\"center top\" data-direction=\"down\" data-mute=\"false\" data-opacity=\"100\" data-velocity=\"-0.3\" data-mobile-enabled=\"false\" data-break_parents=\"0\" data-bg-image=\"https:\/\/anlix.io\/wp-content\/uploads\/2019\/01\/register-cta-bg.png\" data-bg-repeat=\"false\" data-bg-color=\"#1b2032\" ><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-parallax-down nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-equal-height-columns lazyload\" style=\"background-color: #1b2032;background-position: center top;background-repeat: no-repeat;padding-top:5%;padding-right:8%;padding-bottom:6%;padding-left:8%;margin-bottom: 40px;margin-top: 40px;border-width: 0px 0px 0px 0px;border-color:#eae9e9;border-style:solid;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;\" data-bg=\"https:\/\/anlix.io\/wp-content\/uploads\/2019\/01\/register-cta-bg.png\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-16 fusion_builder_column_1_2 1_2 fusion-one-half fusion-column-first fusion-animated\" style=\"width:50%;width:calc(50% - ( ( 4% ) * 0.5 ) );margin-right: 4%;margin-top:30px;margin-bottom:0px;\" data-animationtype=\"fadeInLeft\" data-animationduration=\"0.8\" data-animationoffset=\"100%\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><style type=\"text\/css\"><\/style><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"margin-top:20px;margin-right:0px;margin-bottom:20px;margin-left:0px;\"><h2 class=\"title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;color:#ffffff;--fontSize:35;line-height:1.25;\">Get started now with the Flashbox solution<\/h2><\/div><div class=\"fusion-align-block\"><style type=\"text\/css\">.fusion-button.button-1 {border-radius:10px;}<\/style><a class=\"fusion-button button-flat fusion-button-default-size button-default button-1 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"https:\/\/anlix.io\/en\/contato\/\"><span class=\"fusion-button-text\">start testing<\/span><\/a><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-top:10px;width:100%;\"><div class=\"fusion-separator-border sep-double\" style=\"border-color:#e0dede;border-top-width:1px;border-bottom-width:1px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-8\"><p><span style=\"font-size: 15px; color: #ffffff;\">Need help?\u00a0<\/span><span style=\"color: #4caf08;\"><span style=\"font-size: 15px;\">Contact us<\/span><\/span><\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-17 fusion_builder_column_1_2 1_2 fusion-one-half fusion-column-last fusion-animated\" style=\"width:50%;width:calc(50% - ( ( 4% ) * 0.5 ) );margin-top:25px;margin-bottom:25px;\" data-animationtype=\"fadeInLeft\" data-animationduration=\"0.8\" data-animationoffset=\"100%\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><div class=\"imageframe-align-center\"><span class=\"fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"1289\" height=\"1028\" title=\"cta-start-feat\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271289%27%20height%3D%271028%27%20viewBox%3D%270%200%201289%201028%27%3E%3Crect%20width%3D%271289%27%20height%3D%271028%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/anlix.io\/wp-content\/uploads\/2019\/01\/cta-start-feat.png\" class=\"lazyload img-responsive wp-image-674\"\/><\/span><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n<\/p>","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":1419,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[67],"tags":[70,73],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Seu roteador \u00e9 seguro? An\u00e1lise t\u00e9cnica de seguran\u00e7a em roteadores populares - Anlix<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/anlix.io\/en\/roteador-seguro\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Seu roteador \u00e9 seguro? An\u00e1lise t\u00e9cnica de seguran\u00e7a em roteadores populares - Anlix\" \/>\n<meta property=\"og:url\" content=\"https:\/\/anlix.io\/en\/roteador-seguro\/\" \/>\n<meta property=\"og:site_name\" content=\"Anlix\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/anlix.io\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-10T11:56:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-28T20:12:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/roteador-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/anlix.io\/roteador-seguro\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/anlix.io\/roteador-seguro\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/anlix.io\/#\/schema\/person\/e1de22bb93dcd6bcac97373b0edff18a\"},\"headline\":\"Seu roteador \u00e9 seguro? An\u00e1lise t\u00e9cnica de seguran\u00e7a em roteadores populares\",\"datePublished\":\"2018-09-10T11:56:35+00:00\",\"dateModified\":\"2022-06-28T20:12:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/anlix.io\/roteador-seguro\/\"},\"wordCount\":2680,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/anlix.io\/#organization\"},\"keywords\":[\"equipamentos de telecom\",\"seguran\u00e7a\"],\"articleSection\":[\"CPEs\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/anlix.io\/roteador-seguro\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/anlix.io\/roteador-seguro\/\",\"url\":\"https:\/\/anlix.io\/roteador-seguro\/\",\"name\":\"Seu roteador \u00e9 seguro? An\u00e1lise t\u00e9cnica de seguran\u00e7a em roteadores populares - Anlix\",\"isPartOf\":{\"@id\":\"https:\/\/anlix.io\/#website\"},\"datePublished\":\"2018-09-10T11:56:35+00:00\",\"dateModified\":\"2022-06-28T20:12:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/anlix.io\/roteador-seguro\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/anlix.io\/roteador-seguro\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/anlix.io\/roteador-seguro\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/anlix.io\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seu roteador \u00e9 seguro? An\u00e1lise t\u00e9cnica de seguran\u00e7a em roteadores populares\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/anlix.io\/#website\",\"url\":\"https:\/\/anlix.io\/\",\"name\":\"Anlix\",\"description\":\"Ger\u00eancia, automa\u00e7\u00e3o, monitoramento e an\u00e1lise\",\"publisher\":{\"@id\":\"https:\/\/anlix.io\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/anlix.io\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/anlix.io\/#organization\",\"name\":\"Anlix\",\"url\":\"https:\/\/anlix.io\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/anlix.io\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/anlix-favicon.png\",\"contentUrl\":\"https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/anlix-favicon.png\",\"width\":497,\"height\":497,\"caption\":\"Anlix\"},\"image\":{\"@id\":\"https:\/\/anlix.io\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.instagram.com\/anlix.io\/\",\"https:\/\/www.linkedin.com\/company\/anlix\/\",\"https:\/\/www.youtube.com\/channel\/UC9L5nmnn5oJmfDlSWY2ix6Q\",\"https:\/\/www.facebook.com\/anlix.io\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/anlix.io\/#\/schema\/person\/e1de22bb93dcd6bcac97373b0edff18a\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/anlix.io\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f113facd8fbff60fd0ceee619143ddee?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f113facd8fbff60fd0ceee619143ddee?s=96&d=mm&r=g\",\"caption\":\"admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Is your router secure? Technical security analysis of popular routers - Anlix","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/anlix.io\/en\/roteador-seguro\/","og_locale":"en_US","og_type":"article","og_title":"Seu roteador \u00e9 seguro? An\u00e1lise t\u00e9cnica de seguran\u00e7a em roteadores populares - Anlix","og_url":"https:\/\/anlix.io\/en\/roteador-seguro\/","og_site_name":"Anlix","article_publisher":"https:\/\/www.facebook.com\/anlix.io\/","article_published_time":"2018-09-10T11:56:35+00:00","article_modified_time":"2022-06-28T20:12:01+00:00","og_image":[{"width":1920,"height":1440,"url":"https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/roteador-1.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/anlix.io\/roteador-seguro\/#article","isPartOf":{"@id":"https:\/\/anlix.io\/roteador-seguro\/"},"author":{"name":"admin","@id":"https:\/\/anlix.io\/#\/schema\/person\/e1de22bb93dcd6bcac97373b0edff18a"},"headline":"Seu roteador \u00e9 seguro? An\u00e1lise t\u00e9cnica de seguran\u00e7a em roteadores populares","datePublished":"2018-09-10T11:56:35+00:00","dateModified":"2022-06-28T20:12:01+00:00","mainEntityOfPage":{"@id":"https:\/\/anlix.io\/roteador-seguro\/"},"wordCount":2680,"commentCount":0,"publisher":{"@id":"https:\/\/anlix.io\/#organization"},"keywords":["equipamentos de telecom","seguran\u00e7a"],"articleSection":["CPEs"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/anlix.io\/roteador-seguro\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/anlix.io\/roteador-seguro\/","url":"https:\/\/anlix.io\/roteador-seguro\/","name":"Is your router secure? Technical security analysis of popular routers - Anlix","isPartOf":{"@id":"https:\/\/anlix.io\/#website"},"datePublished":"2018-09-10T11:56:35+00:00","dateModified":"2022-06-28T20:12:01+00:00","breadcrumb":{"@id":"https:\/\/anlix.io\/roteador-seguro\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/anlix.io\/roteador-seguro\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/anlix.io\/roteador-seguro\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/anlix.io\/"},{"@type":"ListItem","position":2,"name":"Seu roteador \u00e9 seguro? An\u00e1lise t\u00e9cnica de seguran\u00e7a em roteadores populares"}]},{"@type":"WebSite","@id":"https:\/\/anlix.io\/#website","url":"https:\/\/anlix.io\/","name":"Anlix","description":"Management, automation, monitoring and analysis","publisher":{"@id":"https:\/\/anlix.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/anlix.io\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/anlix.io\/#organization","name":"Anlix","url":"https:\/\/anlix.io\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/anlix.io\/#\/schema\/logo\/image\/","url":"https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/anlix-favicon.png","contentUrl":"https:\/\/anlix.io\/wp-content\/uploads\/2020\/05\/anlix-favicon.png","width":497,"height":497,"caption":"Anlix"},"image":{"@id":"https:\/\/anlix.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.instagram.com\/anlix.io\/","https:\/\/www.linkedin.com\/company\/anlix\/","https:\/\/www.youtube.com\/channel\/UC9L5nmnn5oJmfDlSWY2ix6Q","https:\/\/www.facebook.com\/anlix.io\/"]},{"@type":"Person","@id":"https:\/\/anlix.io\/#\/schema\/person\/e1de22bb93dcd6bcac97373b0edff18a","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/anlix.io\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f113facd8fbff60fd0ceee619143ddee?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f113facd8fbff60fd0ceee619143ddee?s=96&d=mm&r=g","caption":"admin"}}]}},"_links":{"self":[{"href":"https:\/\/anlix.io\/en\/wp-json\/wp\/v2\/posts\/1189"}],"collection":[{"href":"https:\/\/anlix.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/anlix.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/anlix.io\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/anlix.io\/en\/wp-json\/wp\/v2\/comments?post=1189"}],"version-history":[{"count":4,"href":"https:\/\/anlix.io\/en\/wp-json\/wp\/v2\/posts\/1189\/revisions"}],"predecessor-version":[{"id":1424,"href":"https:\/\/anlix.io\/en\/wp-json\/wp\/v2\/posts\/1189\/revisions\/1424"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/anlix.io\/en\/wp-json\/wp\/v2\/media\/1419"}],"wp:attachment":[{"href":"https:\/\/anlix.io\/en\/wp-json\/wp\/v2\/media?parent=1189"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/anlix.io\/en\/wp-json\/wp\/v2\/categories?post=1189"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/anlix.io\/en\/wp-json\/wp\/v2\/tags?post=1189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}